US20030132742A1 - Compact intelligent electronic device incorporating transformers - Google Patents

Compact intelligent electronic device incorporating transformers Download PDF

Info

Publication number
US20030132742A1
US20030132742A1 US10/358,036 US35803603A US2003132742A1 US 20030132742 A1 US20030132742 A1 US 20030132742A1 US 35803603 A US35803603 A US 35803603A US 2003132742 A1 US2003132742 A1 US 2003132742A1
Authority
US
United States
Prior art keywords
transformer
enclosure
resin
analog circuitry
winding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US10/358,036
Other versions
US6798190B2 (en
Inventor
Stewart Harding
Markus Hirschbold
Rene Jonker
Simon Lightbody
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Power Measurement Ltd
Original Assignee
Power Measurement Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US09/791,420 external-priority patent/US6563697B1/en
Priority claimed from US09/792,701 external-priority patent/US7085824B2/en
Application filed by Power Measurement Ltd filed Critical Power Measurement Ltd
Priority to US10/358,036 priority Critical patent/US6798190B2/en
Assigned to POWER MEASUREMENT LTD. reassignment POWER MEASUREMENT LTD. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: HARDING, STEWART J., LIGHTBODY, SIMON H., HIRSCHBOLD, MARKUS F., JONKER, RENE T.
Publication of US20030132742A1 publication Critical patent/US20030132742A1/en
Application granted granted Critical
Publication of US6798190B2 publication Critical patent/US6798190B2/en
Adjusted expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01DMEASURING NOT SPECIALLY ADAPTED FOR A SPECIFIC VARIABLE; ARRANGEMENTS FOR MEASURING TWO OR MORE VARIABLES NOT COVERED IN A SINGLE OTHER SUBCLASS; TARIFF METERING APPARATUS; MEASURING OR TESTING NOT OTHERWISE PROVIDED FOR
    • G01D4/00Tariff metering apparatus
    • G01D4/002Remote reading of utility meters
    • G01D4/004Remote reading of utility meters to a fixed location
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01RMEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
    • G01R22/00Arrangements for measuring time integral of electric power or current, e.g. electricity meters
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/06Electricity, gas or water supply
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/34Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters 
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/38Encryption being effected by mechanical apparatus, e.g. rotating cams, switches, keytape punchers
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01RMEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
    • G01R21/00Arrangements for measuring electric power or power factor
    • G01R21/133Arrangements for measuring electric power or power factor by using digital technique
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/30Definitions, standards or architectural aspects of layered protocol stacks
    • H04L69/32Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
    • H04L69/322Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
    • H04L69/329Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02BCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO BUILDINGS, e.g. HOUSING, HOUSE APPLIANCES OR RELATED END-USER APPLICATIONS
    • Y02B90/00Enabling technologies or technologies with a potential or indirect contribution to GHG emissions mitigation
    • Y02B90/20Smart grids as enabling technology in buildings sector
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S20/00Management or operation of end-user stationary applications or the last stages of power distribution; Controlling, monitoring or operating thereof
    • Y04S20/30Smart metering, e.g. specially adapted for remote reading
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Definitions

  • This invention relates generally to electrical meters and the manufacturing process of electrical meters and more particularly to simplifying the current transformer assemblies, terminal strip, and connections typically used within electrical meters.
  • Electrical meters such as revenue meters, are used by energy suppliers to accurately measure electrical energy delivered to customers for the purposes of billing and/or collecting revenue, and power quality meters having power quality monitoring, detection and reporting capabilities.
  • the energy meter is an electrical energy measurement device, which accurately measures the amount of electrical energy flowing to the customer from the supplier or from the customer to the supplier. The amount of electrical energy measured by the meter is then used to determine the amount that the energy supplier should be compensated.
  • CTs Some known current transformers (“CTs”) are assembled separately in separate enclosures with a wire harness soldered by hand from the internal meter electronics to each of the transformer connections. Soldering the wire harnesses to the individual connections is time consuming since it introduces additional manufacturing steps. Alternately, CTs are also assembled separately using direct solder connections to the terminals in question. In both processes, providing the CT with a separate enclosure adds extra cost and time in the assembly process and introduces potential for errors and manufacturing defects.
  • the CT has secondary copper coil windings of typically 34-37 gauge (approximately ⁇ 0.005′′), solder connections on such thin wire are susceptible to breakage if handled or jostled improperly.
  • encasing the connections in resin increases the reliability of the circuitry and the entire power meter.
  • Some devices, such as semiconductor chips, are encased in resin and have leads or wires extending out of the resin or enclosure.
  • Some methods produce semiconductor parts by sealing the parts in a resin. However, these methods were intended for low cost solutions or low voltage devices and the electrical spacing and resin insulation were typically not considered.
  • the CTs are subject to potentially high voltage inputs thus are subject to various electrical specifications, described below.
  • CTs are encased in resin in a separate enclosure.
  • the enclosure is then assembled into the final product.
  • CTs are required to be either physically spaced apart or electrically insulated due to the potentially high voltages connected to the device.
  • Such an assembly can encase a transformer subassembly, except for the primary and secondary coil leads, in an epoxy resin, or encase a transformer with insulating material during an injection molding process.
  • the extra steps of creating a subassembly can be time consuming and costly as an extra enclosure is required, plus the additional step of handling the transformer and enclosure is required during the final assembly process.
  • the additional step of handling the transformer also may increase the chances of introducing manufacturing defects.
  • the present system and method can simplify and reduce the size of the assembled transformers installed within the enclosure of an intelligent electronic device.
  • the enclosure houses electrical circuitry and a transformer that includes windings.
  • a resin is set within the enclosure. The resin electrically isolates the windings of the transformer from analog circuitry.
  • a central processing unit is housed within the enclosure. The central processing unit is coupled to the analog circuitry and operative to calculate at least one power management function. At least one of a display and a communications interface is housed within the enclosure and coupled to the central processing unit. Further aspects and advantages of the invention are discussed below in conjunction with the preferred embodiments.
  • FIG. 1 a illustrates a front perspective view of an exemplary device
  • FIG. 1 b illustrates a back perspective view of the exemplary device
  • FIG. 1 c illustrates an alternate back perspective view of the exemplary device
  • FIG. 2 a illustrates a back view of the exemplary device without feature key installed
  • FIG. 2 b illustrates a back view of the exemplary device with feature key installed
  • FIG. 3 a shows a block diagram representation of the electronic circuitry of the device
  • FIG. 3 b illustrates a block diagram representation of the chip on the feature key
  • FIG. 4 is a flowchart representation of authenticating the feature key for a single processor
  • FIG. 5 illustrates an exemplary register according to preferred embodiments
  • FIG. 6 illustrates a back perspective view of the exemplary device with attached modules
  • FIG. 7 is a flow chart representation of an alternate way to authenticate the feature key for multiple processors
  • FIG. 8 shows a perspective view of the device
  • FIG. 9 shows a printed circuit board fitted into the base of the device.
  • FIG. 10 shows a cross sectional view of the current transformer circuitry of FIG. 9.
  • An intelligent electronic device or product can be used to meet different consumer needs.
  • the base functionality of the device can be the same but enhanced or added features may be included from one device model to another.
  • An exemplary device may include the parent or “entry level” device including base functions such as communication functions, harmonic functions and other power measurement functions.
  • An enhanced version offering features such as scheduling functions, arithmetic functions and increased sliding window demand functionality, or a further enhanced version, may include increased functionality such as waveform recording and sag/swell functionality.
  • a hardware feature key can be used that includes a key module and a key code which, when installed on a “base” or “parent” device, configures the base device and allows the user to access and utilize various levels of features.
  • the base device includes the hardware and software functionality to provide many electrical measurements, communications and digital outputs.
  • the hardware feature key can control whether or not any of these features or functions of the device is enabled.
  • Manufacturing one generic device can allow the manufacturer to decrease production related costs by manufacturing one device instead of multiple similar devices.
  • An exemplary device is type 6200 manufactured by Power Measurement Ltd. located in Saanichton, B.C., Canada.
  • power management functions such as voltage and current measurements, are provided on the “base” device, and additional functions, such as harmonics measurement, power factor, real power, reactive energy, apparent energy, reactive power, apparent power, frequency, current demand, voltage demand or other kWh or kW measurements are also provided.
  • power management functions include both software calculations and the associated hardware required to perform the calculations, as described in more detail below.
  • FIGS. 1 a and 1 b show front and back views of an exemplary device 100 , e.g., and IED, respectively.
  • the device 100 includes a base 101 , a cover 102 and a power supply 103 .
  • a feature key 205 that includes a key module containing a key code, connects to the base 101 .
  • FIG. 2 b shows a back view of the device 100 with the power supply 103 removed for clarity.
  • the feature key 205 including the key module and the key code, connects to the base 102 and, in a preferred embodiment, is not accessible when the power supply 103 is connected to the device 100 . Requiring the removal of the power supply 103 ensures that a user, while using the device as intended, remove the power supply before removal of the feature key 205 . Thus the user is prevented from removing the feature key 205 while the device is operating. This prevents a user from enabling the protected features and removing the key while the device is still powered.
  • the feature key 205 includes a printed circuit board (“PCB”) with circuitry placed on the PCB.
  • the circuitry preferably contains a computer chip 310 (FIG. 3 a ) that is operative to aid in enabling and disabling various data registers, hardware and software features on the device.
  • the computer chip is preferably a semiconductor chip with a one-wire connection to the chip in addition to ground. In operation a command is sent to the chip through the one wire connection, and the chip response is sent back along the same wire.
  • An exemplary computer chip is type DS 2432 P, manufactured by Dallas Semiconductor, located in Dallas, Tex.
  • FIG. 3 a illustrates the computer chip 310 as connected to an IED 100 .
  • the IED 100 contains analog circuitry 312 connected to an electric circuit 308 , a CPU 314 containing a set of registers 324 , a display 316 and a communications interface 322 such as an RS485 port.
  • a data Serial Peripheral Interface (“SPITM”) bus 318 connects the CPU 314 and a function module 320 attached to the IED.
  • the CPU further contains a Controller Area Network (“CAN”) bus (not shown) which allows the device to communicate with a remote display.
  • CAN Controller Area Network
  • the IED stores all data as measured from the analog circuitry 312 and calculated by the CPU 314 into at least one register 324 .
  • An exemplary CPU is the DSP56F803 from Motorola Inc., located in Schaumburg, Ill.
  • the use of the feature key 205 allows for protection of firmware stored in the device as the device will not operate without the feature key 205 .
  • Traditional IED's utilize flash memory which contains a “flash lock bit” which enables the manufacturer to load the IED firmware into the memory once, then disable the ability of a user to read the memory. This prohibits unauthorized users from reading and copying the firmware by accessing the CPU's external interface.
  • the device is still enabled to read the memory and run the firmware because the firmware is stored internal to the CPU.
  • An example of a chip containing a “flash lock bit” is the PIC16C67 microcontroller manufactured by Microchip Technologies located in Chandler, Ariz.
  • the IED 100 is rendered inoperable without a feature key 205 , thus preventing unauthorized users from operating the firmware without the key 205 .
  • This allows the manufacturer to reduce the need for memory which contains the “flash lock bit” and thus reduce the vulnerability of the firmware to piracy or copying by unauthorized individuals.
  • the computer chip 310 which is contained in the feature key's circuitry 330 , contains an encryption algorithm engine 352 , memory 350 and a unique 64-bit ROM serial number 354 which allows for unique identity.
  • the chip also contains an 8-byte secret code which can preferably be written through the computer chip 310 interface but cannot be read. This 8-byte secret code is located in the memory 350 . The combination of the unique serial number and the secret 8-byte code make the chip difficult to duplicate.
  • an authentication code is created upon power-up of the device and compared to an authentication code on the chip. If the authentication does not match, the IED 100 is disabled. In one embodiment disabling the IED 100 will power down the device and in an alternate embodiment the IED 100 functionality is reduced to only minimal functions, such as displaying an error message or status report.
  • FIG. 4 illustrates a way to authenticate the activation codes.
  • the chip data on the key is read into a data array in the CPU 314 .
  • Chip data includes the unique serial number of the chip, a memory pattern indicating the options that the feature key 205 enables and the family code in the chip 310 .
  • the family code specifies the communication requirements of the chip.
  • the memory pattern is written into the computer chip 310 during manufacture of the feature key 205 .
  • an additional secret memory pattern is written to the computer chip 310 . This additional pattern cannot be read out of the computer chip 310 and is preferably only known to the manufacturer of the feature key 205 . Further, the same secret memory pattern is also programmed into the IED 100 during manufacture.
  • the CPU 314 then copies the secret memory pattern and constant values required for operation of the chip from its internal non-volatile memory to additional locations in the data array, block 412 .
  • the constant values are as required for operation of the chip as specified by the manufacturer.
  • the CPU 314 selects a challenge, block 414 , and writes the challenge to the feature key 205 , block 416 .
  • the challenge is a 3-byte code utilized for additional security in authentication.
  • Both the CPU 314 and the computer chip 310 calculate a Message Authentication Code (“MAC”) based on data in the computer chip 310 , the secret, the challenge and the unique serial number, blocks 418 420 .
  • the MAC is preferably derived from the Secure Hash Standard SHA-1 which is published in the Federal Information Processing Standards Publication 180-1.
  • the computer chip 310 on the key then transmits its result for the MAC to the CPU 314 , block 422 , and the CPU 314 compares the MAC received from the key with its own calculation, block 424 .
  • the memory pattern indicating the options that the key enables is written to an enabling arraying on the CPU 314 , block 428 , and operation of the IED 100 continues. Otherwise, if the MAC's do not match, operation of the device is disabled, block 444 .
  • the chip operation as described above, is done in accordance with the chip manufacturers specifications.
  • the memory pattern indicating the options that the key enables could also be encrypted using any of the methods known in the art, such as public or private key encryption.
  • even greater security could be realized by randomizing the challenge each time the procedure is executed.
  • registers 524 are illustrated that store data generated by the IED 100 .
  • a first register type 525 contains device configuration data
  • a second register type 526 contains non-volatile data
  • a third register type 527 contains volatile data.
  • the first register type 525 and second register type 526 sets of data have RAM locations and their contents are periodically backed-up to flash memory (not shown) and the third register type 527 set of data registers exist in RAM.
  • the communications interface 322 as shown in FIG. 3 a allows a user to read the registers 524 remotely and the display 316 allows the user to view the data contained in the registers.
  • the computer chip 310 controls the ability to read the contents of a specific register.
  • a 256-bit bit-pattern is copied to a RAM location in the device known as the enabling array 505 that is organized in a 16-row by 16-column format.
  • the enabling array 505 is part of the key code of the feature key 205 .
  • a flag lookup table 512 contained in the firmware of the device contains a 32-bit field corresponding to each register. Eight of the 32 bits are dedicated to security of the specific register, the first four bits 513 of those eight bits point to the row index position in the enabling array and the latter four bits 514 point to the column index position in the enabling array 505 . Based on the values present 515 in the enabling array 505 , access to the register 524 a is either permitted or denied.
  • a cell position 515 containing ‘0’ means that the register 524 a corresponding to that 32 bit field is disabled. Attempts to access a disabled register can result in an error condition being returned.
  • the register cell 524 a is enabled and can be accessed. The security of access (‘1’) and no access (‘0’) is maintained in the enabling array 505 .
  • the lookup table 512 is part of the device firmware and is associated with the same cell 515 in the enabling array 505 . Changing or replacing the key 310 can be used to update the enabling array 505 .
  • FIG. 5 also illustrates how the feature key 205 controls access to various hardware features.
  • the hardware driver 531 a section of the firmware which controls the operation of a specific hardware function, is allocated an index position 530 in the enabling array.
  • each of the hardware drivers performs an initialization sequence to put the hardware in a known state, ready for operation.
  • the hardware driver checks its index position in the enabling array. As above, if the bit is zero, then the hardware is put into an inoperative state, if the bit is one, then the hardware is enabled for normal operation, or vise versa.
  • the external function modules 630 offer expandable features to the basic device.
  • modules may contain additional power management features, both hardware and software based, such as additional communications, advanced communications, wireless communications, analog inputs/outputs, digital inputs/outputs, data or energy logging features, Ethernet connections, communication protocol capabilities, such as LonworksTM capabilities, additional memory options or processing power for measurement, analysis and control.
  • additional communications such as optical communications, wireless communications and various other types of telephony communications may be utilized by a module.
  • Modules typically have the capability of retrieving or generating data, or a combination of both.
  • the software calculation based power management features may include data such as voltage and current measurements, harmonics measurement, power factor, real power, reactive energy, apparent energy, reactive power, apparent power, frequency, current demand, voltage demand or other kWh or kW measurements.
  • Power management functions may include power measurement functions, such as measuring voltage and current, as well as power management functions, such as calculating power. Additionally, power management functions may be utilized to monitor and/or measure control power quality, protection, control or data logging on non-electrical parameters such as oil, gas, water, heat or steam.
  • the enabling of the module functions is automatically done by default and in an alternate embodiment enabling the modules is done via the feature key 205 .
  • the use of a feature key 205 combined with added modules also allows the device to be easily upgraded in the field as a device can have a module or new feature key replaced or installed without taking the device out of service.
  • the modules are attached to a pass through connector which enables the power supply to be attached last. This pass through connector, e.g., containing the SPITM bus 318 , as shown in FIG. 3, connects the function modules 630 the power supply 103 and the main circuitry and CPU 314 on the device.
  • the communications between the power supply 103 , external function modules 630 and the device circuitry is done using a custom protocol, however, it can be appreciated that a standard protocol, such as Peripheral Connect Interface (PCI) bus, VME bus or other protocols known in the art. It can be appreciated that the communications transfers can be both encrypted and unencrypted. Further, in the preferred embodiment the addition of extra function modules 630 requires the removal of the power supply 103 , thus the user is prohibited from removing the feature key once the device has authenticated and enabled the hardware.
  • PCI Peripheral Connect Interface
  • the feature key 205 need be upgraded to increase functionality of the device if the supporting hardware exists or alternately only modules need be added or upgraded if the feature key 205 supports the addition of this new hardware.
  • a customer orders a device with only the base functionality of monitoring voltage, current and power, but later wishes to upgrade the device to monitor energy data, such as kWh.
  • the feature key 205 disables the access to the data as described above.
  • the upgraded feature key 205 enhances the functionality of the device by providing access to kWh data without the replacement of measurement hardware or the replacement of firmware.
  • the function modules 630 a - d completely replace the authenticating and enabling hardware of the meter, by reading the feature key directly. This permits the addition of new modules that were not envisioned when the original meter was designed.
  • the module may require read access or write access or both read and write access to the register set on the base unit. This is accomplished by transferring register values between the base unit and the module. This transfer requires that the module enforce the same security restrictions as those dictated by the security key on the base unit.
  • the flag lookup table 512 is preferably included in the firmware of the module. In order to operate correctly, the module also has access to an enabling array to act in conjunction with the flag lookup table, as outlined above.
  • FIG. 7 is a flowchart illustrating the steps involved in authenticating the activation codes with added modules.
  • the power supply 103 is disconnected from the device and the feature key 205 is replaced with an upgraded feature key, block 700 .
  • the module may have the ability to accept an additional key that overrides the original key attached to the device. This allows a user to install an upgraded module and associated key which embodies the features and functions not envisioned or supported in the original base device. In either case an upgraded or additional feature key allows for the addition of the module functionality to the device.
  • the modules 630 are connected to the device, block 702 , and the power supply is connected 704 . As illustrated in FIG. 3, the device, the power supply and the modules are all connected via a bus 318 , thereby allowing data transfer between them.
  • the device Upon initial power up of the device, block 706 , the device checks the modules to see if an additional processor, the auxiliary processor, is provided with the module, block 710 . If no auxiliary processor is detected, the processor on the base unit is used for authentication purposes, block 720 .
  • the base unit 101 searches for a feature key 205 attached to the module, block 714 . If a feature key 205 is found attached to the module, the auxiliary processor is designated as the master processor for authentication purposes, block 722 . If no feature key 205 is found to be attached to the module, then the device processor is designated as the master processor for authentication purposes, block 720 and the feature key located on the device is utilized.
  • allowing the module to contain an auxiliary processor allows the module to act either as an extension of the original base device, and the base device's associated CPU, or act as master CPU for the entire device.
  • the ability to add a module with a feature key 205 allows the user to override the device processor and original feature key embedded and attached to the original device. This allows for ease of upgrading a device, such as firmware or software upgrades, or adding future modules to perform calculations or functions which are too advanced for the device processor to handle.
  • the module CPU reads the feature key 205 directly performing the required authentication, as outlined earlier.
  • the master processor for authentication purposes then goes through the same procedure as outlined in FIG. 4 blocks 410 - 426 for the single processor case, block 730 .
  • the device is disabled 444 or, in an alternate embodiment, the IED functionality is reduced to only minimal functions, such as displaying an error message or status report.
  • the key memory is written to an internal array, and the register control is set, block 744 .
  • the enabling array is copied from the authentication master device to the slave devices, block 748 . Specifically, if the module is the master, the enabling array is copied to the device. If the main unit is the master, then the enabling array is copied to the module.
  • the values in the data register measured by the device are copied to the module 750 and the access table and lookup table are applied to both the module register and the device register.
  • the lookup table flag accesses the access table and returns a ‘0’ or ‘1’ based on the index location provided by the flag, and then disables or enables the access to the associated register's data 752 .
  • the register control allows the device and the module to maintain a coherent access policy.
  • modules to the device implies a multi-processor/multi-master architecture, since either the device or the module may wish to assert control over a specific register.
  • the default value is all register fields, unless specified, are controlled by the device CPU 314 .
  • the device and module constantly record and update data into the respective registers, or a specific register, and the registers are copied between the device and module 760 .
  • a master read/write control is set between the device and module registers to ensure the appropriate data is current.
  • Devices such as Intelligent Electronic Devices (“IEDs”) and more specifically electric meters and revenue meters typically include transformers such as current transformers. IEDs include protection relays, fault recorders and electrical meters and other devices used to manage, measure and control the distribution of electric power. Electrical meters include revenue meters of the type used by energy suppliers to accurately measure electrical energy delivered to consumers for the purposes of billing and/or collecting revenue, and power quality meters having power quality monitoring, detection and reporting capabilities.
  • IEDs Intelligent Electronic Devices
  • Electrical meters include revenue meters of the type used by energy suppliers to accurately measure electrical energy delivered to consumers for the purposes of billing and/or collecting revenue, and power quality meters having power quality monitoring, detection and reporting capabilities.
  • a current transformer usually includes a magnetic core and two windings, a primary and a secondary winding.
  • the primary winding either passes through the core, or winds around the core, and is the wire that has current incoming from the line or attached connection.
  • the secondary winding is wrapped around the magnetic core and produces the measured current.
  • a change in the incoming current produces a change in the magnetic flux that induces a change in the measured current.
  • a large incoming current has been transformed into a smaller, more easily measured current.
  • electrical isolation or physical separation between the primary incoming and secondary measured circuits has been performed.
  • a method and apparatus can simplify the manufacturing process of a meter which one or more current transformers (“CTs”) are connected to the transformer circuitry on a circuit board.
  • CTs current transformers
  • the CTs are placed in the main meter enclosure, the primary windings being electrically insulated with a resin compound from the remainder of the electrical device.
  • PTs voltage or potential transformers
  • Exemplary meters include type 7500 or type 8500 power meters manufactured by Power Measurement, located in Saanichton, B.C., Canada.
  • relevant American National Standards Institute (ANSI) standards such as ANSI 39.1 “Requirements, Electrical Analog Indicating Instruments,” specify requirements of the device, including size.
  • ANSI 39.1 “Requirements, Electrical Analog Indicating Instruments”
  • An example of a size standard is a ⁇ 103 mm diameter cutout as defined by ANSI 39.1.
  • the spacing requirements of the transformer circuitry should meet the electrical standards while still complying with relevant size requirements.
  • eliminating the transformer enclosures found in past devices can provide a compact device. Further, this method can be used to fabricate a device using fewer manufacturing steps, thus lowering production related costs and decreasing the chance of production related errors.
  • FIG. 1 a, FIG. 1 b and FIG. 1 c show perspective views of an exemplary meter.
  • the device 100 comprises a base 101 and a cover 102 .
  • An exemplary device is type 6200, manufactured by Power Measurement Ltd. located in Saanichton, B.C., Canada.
  • FIG. 2 a shows a back view of the device 200 , the base 201 having voltage connectors 205 206 207 208 209 and current connectors 220 221 222 223 224 225 inset into the base 101 .
  • the base is injection molded plastic with the current and voltage connectors press-fit into openings in the base.
  • the connectors may be directly molded into the base.
  • a drawback of these traditional connectors can be that they do not provide the required spacing specifications while meeting the aforementioned ANSI specifications.
  • FIG. 8 shows a perspective view of the device 100 including current transformers (“CTs”) 810 a 810 b 810 c that are connected to PCB connector pins 811 a 811 b 811 c.
  • CTs current transformers
  • a wire or stamped plate 812 a 812 b 812 c passes through the center of the CT 810 a 810 b 810 c, and completes the circuit formed with the current connectors 220 221 222 223 224 225 (FIG. 2 a ).
  • the current connectors, voltage connectors and CTs comprise a portion of analog circuitry 312 .
  • the CTs are located in a depression 830 in the base 101 , and then the depression is filled with an epoxy resin 1030 (shown in FIG. 10) having a dielectric strength that electrically insulates the CT circuitry.
  • the dielectric strength of a material is a value, measured in units of volts/distance, of the property of the material that expresses when electrical failure or breakdown occurs. In the preferred embodiment the dielectric strength of the resin is at least 400V/mil (15750 V/mm).
  • the CT circuitry is spaced according to IEC-61010 specifications published by the International Electrotechnical Commission in Geneva, Switzerland.
  • the meter in a preferred embodiment requires, according to the IEC specification, spacing for a maximum of 3700V between the primary and the secondary if the device is to be specified for 300V on its current terminals.
  • the CT circuitry is shown more clearly in upcoming FIG. 10.
  • the IEC specification also contains safety specification requirements.
  • a transformer with 300V on current primary requires 6.5 mm insulation spacing between connection points of the primary and secondary with only air as a spacing.
  • the resin 1030 is Loctite® 3140/3164 Epoxy, manufactured by Loctite Corporation located in DesPlains, Ill., which contains a dielectric strength of 410 V/mil (16140 V/mm).
  • the insulation spacing requirements are reduced from 6.5 mm to 0.21 mm. Electrically insulating the CTs allows for a more compact device.
  • the CTs are angled during the manufacturing process.
  • the positioning of the CTs allows further reduction in space while still continuing to meet the spacing requirements.
  • the current connectors 220 , 221 , 222 , 223 , 224 and 225 are staggered.
  • a printed circuit board (“PCB”) 910 is fitted into the base 101 , the PCB connector pins 911 a 911 b 911 c passing through openings in the PCB 910 .
  • the PCB connectors are connectors such as TSW-103-09-G-S, manufactured by Samtec, Inc., located in New Albany, Ind. Further, in the preferred embodiment, solder is applied to the PCB such that the PCB is physically attached to the CT circuitry, and thus attaching the PCB to the base 101 .
  • FIG. 10 is a sectional view A-A of FIG. 9 that illustrates the electrical connection of the CT.
  • the current connectors 224 225 are fitted into a depression in the base 101 .
  • a bar 812 c or other type of stamped part then connects the current connectors 224 225 together, while passing through the center of the CT 810 c.
  • the transformer primary circuitry is the electrical path made from the current connectors 224 225 and the bar 812 c where the secondary electrical path is made from the wire windings on the CT 810 c to the PCB connector 911 c via secondary wires shown in FIG. 8.
  • a resin 1030 , or other type of potting compound is poured into the depression, which then electrically insulates the CT 810 c and associated circuitry. Finally, the CT 810 c, which is electrically connected to the PCB connector 911 c, is soldered into the PCB 910 .
  • the PCB connector 911 c may be made using press-fit or other types of connections that require no soldering.

Abstract

An intelligent electronic device (IED) is disclosed for managing, measuring and controlling the distribution of electric power. The IED includes an enclosure. The enclosure houses electrical circuitry and a transformer that includes windings. A resin is set within the enclosure. The resin electrically isolates the windings of the transformer from analog circuitry. A central processing unit is housed within the enclosure. The central processing unit is coupled to the analog circuitry and operative to calculate at least one power management function. At least one of a display and a communications interface is housed within the enclosure and coupled to the central processing unit.

Description

    FIELD OF THE INVENTION
  • This invention relates generally to electrical meters and the manufacturing process of electrical meters and more particularly to simplifying the current transformer assemblies, terminal strip, and connections typically used within electrical meters. [0001]
  • RELATED APPLICATIONS
  • This application claims priority as a continuation of U.S. patent application Ser. No. 09/792,701 filed Feb. 23, 2001 entitled “SYSTEMS FOR IN THE FIELD CONFIGURATION OF INTELLIGENT ELECTRONIC DEVICES” (pending) and U.S. patent application Ser. No. 09/791,420 filed Feb. 23, 2001 entitled “APPARATUS FOR MOUNTING A DEVICE ON A MOUNTING SURFACE” (pending), which are incorporated by reference herein. U.S. patent application Ser. No. 09/792,701 incorporates by reference U.S. patent application Ser. No. 09/791,421 filed Feb. 23, 2001 entitled “MULTI-FEATURED POWER METER WITH FEATURE KEY” (pending) and U.S. patent application Ser. No. 09/791,420 incorporates by reference U.S. patent application Ser. No. 09/791,419 filed Feb. 23, 2001 entitled “ASSEMBLY OF COMPACT POWER DEVICE” (abandoned), which are also incorporated by reference herein. [0002]
  • BACKGROUND
  • Electrical meters, such as revenue meters, are used by energy suppliers to accurately measure electrical energy delivered to customers for the purposes of billing and/or collecting revenue, and power quality meters having power quality monitoring, detection and reporting capabilities. There will typically be an electrical energy meter, such as a revenue meter, at a customer's facility connected between the customer and the power distribution network to measure the customer's electrical demand. The energy meter is an electrical energy measurement device, which accurately measures the amount of electrical energy flowing to the customer from the supplier or from the customer to the supplier. The amount of electrical energy measured by the meter is then used to determine the amount that the energy supplier should be compensated. [0003]
  • The deregulation of the electric utility industry has created a larger need for such electrical power measurement devices. Additionally, as technology advances and consumers become more reliant on electricity for their business needs, the need for devices that perform more complex functions and contain more features, and thus circuitry, is imposed upon the manufacturers. However, to keep up with the deregulation, many consumers are required to replace and install these new complex devices into existing cutouts or enclosures, and further these cutouts are often cut to pre-defined standard sizes. These standard enclosure or cutout sizes are often old as they have generally been in place for several years, if not several decades, thus the rapidly advancing technology has had to conform to the older standards. Accordingly, there is a need for more a compact device that still meets the requirements of the relevant physical and electrical standards. [0004]
  • As devices have become more compact, however, designers have often had to sacrifice mechanical reliability for space. For example, a designer may want to include supports in a device to ensure the delicate circuitry and associated connections are not damaged when the device is handled. However, with space restrictions the designer may be required to reduce these supports, or eliminate them entirely, thereby effectively decreasing the reliability of the device. Accordingly there is a need for a more compact device that still meets mechanical reliability needs. [0005]
  • Some known current transformers (“CTs”) are assembled separately in separate enclosures with a wire harness soldered by hand from the internal meter electronics to each of the transformer connections. Soldering the wire harnesses to the individual connections is time consuming since it introduces additional manufacturing steps. Alternately, CTs are also assembled separately using direct solder connections to the terminals in question. In both processes, providing the CT with a separate enclosure adds extra cost and time in the assembly process and introduces potential for errors and manufacturing defects. [0006]
  • Since the CT has secondary copper coil windings of typically 34-37 gauge (approximately ø0.005″), solder connections on such thin wire are susceptible to breakage if handled or jostled improperly. Thus, encasing the connections in resin increases the reliability of the circuitry and the entire power meter. Some devices, such as semiconductor chips, are encased in resin and have leads or wires extending out of the resin or enclosure. Some methods produce semiconductor parts by sealing the parts in a resin. However, these methods were intended for low cost solutions or low voltage devices and the electrical spacing and resin insulation were typically not considered. In known energy meters, the CTs are subject to potentially high voltage inputs thus are subject to various electrical specifications, described below. [0007]
  • In some devices, such as power meters, CTs are encased in resin in a separate enclosure. The enclosure is then assembled into the final product. CTs are required to be either physically spaced apart or electrically insulated due to the potentially high voltages connected to the device. Such an assembly can encase a transformer subassembly, except for the primary and secondary coil leads, in an epoxy resin, or encase a transformer with insulating material during an injection molding process. The extra steps of creating a subassembly can be time consuming and costly as an extra enclosure is required, plus the additional step of handling the transformer and enclosure is required during the final assembly process. The additional step of handling the transformer also may increase the chances of introducing manufacturing defects. Thus, there is a need for an improved device and assembly. [0008]
  • SUMMARY
  • The invention is defined by the claims, and nothing in this section should be taken as a limitation on the claims. [0009]
  • As the complexity of devices grows, the size of the required circuitry often increases. However, in this age of rapidly advancing technology, consumers often expect the device to remain the same size or become physically smaller. In order to meet these needs or expectations a manufacturer reduces the size of a device while still adhering to the appropriate standards. [0010]
  • The present system and method can simplify and reduce the size of the assembled transformers installed within the enclosure of an intelligent electronic device. The enclosure houses electrical circuitry and a transformer that includes windings. A resin is set within the enclosure. The resin electrically isolates the windings of the transformer from analog circuitry. A central processing unit is housed within the enclosure. The central processing unit is coupled to the analog circuitry and operative to calculate at least one power management function. At least one of a display and a communications interface is housed within the enclosure and coupled to the central processing unit. Further aspects and advantages of the invention are discussed below in conjunction with the preferred embodiments.[0011]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1[0012] a illustrates a front perspective view of an exemplary device;
  • FIG. 1[0013] b illustrates a back perspective view of the exemplary device;
  • FIG. 1[0014] c illustrates an alternate back perspective view of the exemplary device;
  • FIG. 2[0015] a illustrates a back view of the exemplary device without feature key installed;
  • FIG. 2[0016] b illustrates a back view of the exemplary device with feature key installed;
  • FIG. 3[0017] a shows a block diagram representation of the electronic circuitry of the device;
  • FIG. 3[0018] b illustrates a block diagram representation of the chip on the feature key;
  • FIG. 4 is a flowchart representation of authenticating the feature key for a single processor; [0019]
  • FIG. 5 illustrates an exemplary register according to preferred embodiments; [0020]
  • FIG. 6 illustrates a back perspective view of the exemplary device with attached modules; [0021]
  • FIG. 7 is a flow chart representation of an alternate way to authenticate the feature key for multiple processors; [0022]
  • FIG. 8 shows a perspective view of the device; [0023]
  • FIG. 9 shows a printed circuit board fitted into the base of the device; and [0024]
  • FIG. 10 shows a cross sectional view of the current transformer circuitry of FIG. 9.[0025]
  • DETAILED DESCRIPTION OF THE PRESENTLY PREFERRED EMBODIMENTS
  • Several versions of an intelligent electronic device (IED) or product can be used to meet different consumer needs. The base functionality of the device can be the same but enhanced or added features may be included from one device model to another. An exemplary device may include the parent or “entry level” device including base functions such as communication functions, harmonic functions and other power measurement functions. An enhanced version offering features such as scheduling functions, arithmetic functions and increased sliding window demand functionality, or a further enhanced version, may include increased functionality such as waveform recording and sag/swell functionality. [0026]
  • A hardware feature key can be used that includes a key module and a key code which, when installed on a “base” or “parent” device, configures the base device and allows the user to access and utilize various levels of features. For example, the base device includes the hardware and software functionality to provide many electrical measurements, communications and digital outputs. The hardware feature key can control whether or not any of these features or functions of the device is enabled. [0027]
  • Manufacturing one generic device can allow the manufacturer to decrease production related costs by manufacturing one device instead of multiple similar devices. An exemplary device is type 6200 manufactured by Power Measurement Ltd. located in Saanichton, B.C., Canada. In the exemplary device power management functions, such as voltage and current measurements, are provided on the “base” device, and additional functions, such as harmonics measurement, power factor, real power, reactive energy, apparent energy, reactive power, apparent power, frequency, current demand, voltage demand or other kWh or kW measurements are also provided. It can be appreciated that power management functions include both software calculations and the associated hardware required to perform the calculations, as described in more detail below. [0028]
  • Referring to the drawings, FIGS. 1[0029] a and 1 b show front and back views of an exemplary device 100, e.g., and IED, respectively. The device 100 includes a base 101, a cover 102 and a power supply 103. A feature key 205, that includes a key module containing a key code, connects to the base 101.
  • FIG. 2[0030] b shows a back view of the device 100 with the power supply 103 removed for clarity. The feature key 205, including the key module and the key code, connects to the base 102 and, in a preferred embodiment, is not accessible when the power supply 103 is connected to the device 100. Requiring the removal of the power supply 103 ensures that a user, while using the device as intended, remove the power supply before removal of the feature key 205. Thus the user is prevented from removing the feature key 205 while the device is operating. This prevents a user from enabling the protected features and removing the key while the device is still powered.
  • In a preferred embodiment the [0031] feature key 205 includes a printed circuit board (“PCB”) with circuitry placed on the PCB. The circuitry preferably contains a computer chip 310 (FIG. 3a) that is operative to aid in enabling and disabling various data registers, hardware and software features on the device. The computer chip is preferably a semiconductor chip with a one-wire connection to the chip in addition to ground. In operation a command is sent to the chip through the one wire connection, and the chip response is sent back along the same wire. An exemplary computer chip is type DS2432P, manufactured by Dallas Semiconductor, located in Dallas, Tex.
  • FIG. 3[0032] a illustrates the computer chip 310 as connected to an IED 100. In a preferred embodiment the IED 100 contains analog circuitry 312 connected to an electric circuit 308, a CPU 314 containing a set of registers 324, a display 316 and a communications interface 322 such as an RS485 port. A data Serial Peripheral Interface (“SPITM”) bus 318 connects the CPU 314 and a function module 320 attached to the IED. The CPU further contains a Controller Area Network (“CAN”) bus (not shown) which allows the device to communicate with a remote display. In operation the IED stores all data as measured from the analog circuitry 312 and calculated by the CPU 314 into at least one register 324. An exemplary CPU is the DSP56F803 from Motorola Inc., located in Schaumburg, Ill.
  • The use of the [0033] feature key 205 allows for protection of firmware stored in the device as the device will not operate without the feature key 205. Traditional IED's utilize flash memory which contains a “flash lock bit” which enables the manufacturer to load the IED firmware into the memory once, then disable the ability of a user to read the memory. This prohibits unauthorized users from reading and copying the firmware by accessing the CPU's external interface. The device is still enabled to read the memory and run the firmware because the firmware is stored internal to the CPU. An example of a chip containing a “flash lock bit” is the PIC16C67 microcontroller manufactured by Microchip Technologies located in Chandler, Ariz.
  • In a preferred embodiment the [0034] IED 100 is rendered inoperable without a feature key 205, thus preventing unauthorized users from operating the firmware without the key 205. This allows the manufacturer to reduce the need for memory which contains the “flash lock bit” and thus reduce the vulnerability of the firmware to piracy or copying by unauthorized individuals.
  • As illustrated in FIG. 3[0035] b the computer chip 310, which is contained in the feature key's circuitry 330, contains an encryption algorithm engine 352, memory 350 and a unique 64-bit ROM serial number 354 which allows for unique identity. The chip also contains an 8-byte secret code which can preferably be written through the computer chip 310 interface but cannot be read. This 8-byte secret code is located in the memory 350. The combination of the unique serial number and the secret 8-byte code make the chip difficult to duplicate. In a preferred embodiment, an authentication code is created upon power-up of the device and compared to an authentication code on the chip. If the authentication does not match, the IED 100 is disabled. In one embodiment disabling the IED 100 will power down the device and in an alternate embodiment the IED 100 functionality is reduced to only minimal functions, such as displaying an error message or status report.
  • FIG. 4 illustrates a way to authenticate the activation codes. At [0036] block 400, in operation, when the device 100 is first powered up, the chip data on the key is read into a data array in the CPU 314. Chip data includes the unique serial number of the chip, a memory pattern indicating the options that the feature key 205 enables and the family code in the chip 310. The family code specifies the communication requirements of the chip. The memory pattern is written into the computer chip 310 during manufacture of the feature key 205. During manufacture of the feature key 205 an additional secret memory pattern is written to the computer chip 310. This additional pattern cannot be read out of the computer chip 310 and is preferably only known to the manufacturer of the feature key 205. Further, the same secret memory pattern is also programmed into the IED 100 during manufacture.
  • The [0037] CPU 314 then copies the secret memory pattern and constant values required for operation of the chip from its internal non-volatile memory to additional locations in the data array, block 412. In a preferred embodiment the constant values are as required for operation of the chip as specified by the manufacturer. The CPU 314 selects a challenge, block 414, and writes the challenge to the feature key 205, block 416. The challenge is a 3-byte code utilized for additional security in authentication.
  • Both the [0038] CPU 314 and the computer chip 310 calculate a Message Authentication Code (“MAC”) based on data in the computer chip 310, the secret, the challenge and the unique serial number, blocks 418 420. The MAC is preferably derived from the Secure Hash Standard SHA-1 which is published in the Federal Information Processing Standards Publication 180-1. The computer chip 310 on the key then transmits its result for the MAC to the CPU 314, block 422, and the CPU 314 compares the MAC received from the key with its own calculation, block 424. If the MAC's match, block 426, the memory pattern indicating the options that the key enables is written to an enabling arraying on the CPU 314, block 428, and operation of the IED 100 continues. Otherwise, if the MAC's do not match, operation of the device is disabled, block 444. In the preferred embodiment the chip operation, as described above, is done in accordance with the chip manufacturers specifications.
  • It will be appreciated that the memory pattern indicating the options that the key enables could also be encrypted using any of the methods known in the art, such as public or private key encryption. In addition, it will be appreciated that even greater security could be realized by randomizing the challenge each time the procedure is executed. [0039]
  • Referring to FIG. 5, registers [0040] 524 are illustrated that store data generated by the IED 100. A first register type 525 contains device configuration data, a second register type 526 contains non-volatile data and a third register type 527 contains volatile data. Preferably, the first register type 525 and second register type 526 sets of data have RAM locations and their contents are periodically backed-up to flash memory (not shown) and the third register type 527 set of data registers exist in RAM. The communications interface 322, as shown in FIG. 3a allows a user to read the registers 524 remotely and the display 316 allows the user to view the data contained in the registers. The computer chip 310 controls the ability to read the contents of a specific register.
  • Upon successful completion of the key verification sequence, a 256-bit bit-pattern is copied to a RAM location in the device known as the enabling [0041] array 505 that is organized in a 16-row by 16-column format. The enabling array 505 is part of the key code of the feature key 205. Those skilled in the art will appreciate that other formats for the enabling array could be used. A flag lookup table 512 contained in the firmware of the device contains a 32-bit field corresponding to each register. Eight of the 32 bits are dedicated to security of the specific register, the first four bits 513 of those eight bits point to the row index position in the enabling array and the latter four bits 514 point to the column index position in the enabling array 505. Based on the values present 515 in the enabling array 505, access to the register 524 a is either permitted or denied.
  • For example, if the eight security bits on the lookup table [0042] 512 point to the fifth column 513 and the third row 514 of the enabling array 505, a cell position 515 containing ‘0’ means that the register 524 a corresponding to that 32 bit field is disabled. Attempts to access a disabled register can result in an error condition being returned. However, if the eight security bits on the lookup table 512 points to a position containing ‘1’ in the enabling array 505, the register cell 524 a is enabled and can be accessed. The security of access (‘1’) and no access (‘0’) is maintained in the enabling array 505. Those skilled in the art will appreciate that other values could be used to represent access and no access, such as access (‘0’) and no access (1’). The lookup table 512 is part of the device firmware and is associated with the same cell 515 in the enabling array 505. Changing or replacing the key 310 can be used to update the enabling array 505.
  • FIG. 5 also illustrates how the [0043] feature key 205 controls access to various hardware features. The hardware driver 531, a section of the firmware which controls the operation of a specific hardware function, is allocated an index position 530 in the enabling array. After power-up, each of the hardware drivers performs an initialization sequence to put the hardware in a known state, ready for operation. During the initialization sequence, the hardware driver checks its index position in the enabling array. As above, if the bit is zero, then the hardware is put into an inoperative state, if the bit is one, then the hardware is enabled for normal operation, or vise versa.
  • Referring now to FIG. 6, a back view of the [0044] device 100 is shown with multiple external function modules 630 a 630 b 630 c 630 d attached to the device 100. The external function modules 630 offer expandable features to the basic device. For example, modules may contain additional power management features, both hardware and software based, such as additional communications, advanced communications, wireless communications, analog inputs/outputs, digital inputs/outputs, data or energy logging features, Ethernet connections, communication protocol capabilities, such as Lonworks™ capabilities, additional memory options or processing power for measurement, analysis and control. Further, other communications and connections such as optical communications, wireless communications and various other types of telephony communications may be utilized by a module.
  • Modules typically have the capability of retrieving or generating data, or a combination of both. Of these features the software calculation based power management features may include data such as voltage and current measurements, harmonics measurement, power factor, real power, reactive energy, apparent energy, reactive power, apparent power, frequency, current demand, voltage demand or other kWh or kW measurements. Power management functions may include power measurement functions, such as measuring voltage and current, as well as power management functions, such as calculating power. Additionally, power management functions may be utilized to monitor and/or measure control power quality, protection, control or data logging on non-electrical parameters such as oil, gas, water, heat or steam. [0045]
  • In a preferred embodiment the enabling of the module functions is automatically done by default and in an alternate embodiment enabling the modules is done via the [0046] feature key 205. The use of a feature key 205 combined with added modules also allows the device to be easily upgraded in the field as a device can have a module or new feature key replaced or installed without taking the device out of service. In a preferred embodiment the modules are attached to a pass through connector which enables the power supply to be attached last. This pass through connector, e.g., containing the SPI™ bus 318, as shown in FIG. 3, connects the function modules 630 the power supply 103 and the main circuitry and CPU 314 on the device. In the preferred embodiment the communications between the power supply 103, external function modules 630 and the device circuitry is done using a custom protocol, however, it can be appreciated that a standard protocol, such as Peripheral Connect Interface (PCI) bus, VME bus or other protocols known in the art. It can be appreciated that the communications transfers can be both encrypted and unencrypted. Further, in the preferred embodiment the addition of extra function modules 630 requires the removal of the power supply 103, thus the user is prohibited from removing the feature key once the device has authenticated and enabled the hardware.
  • It can be appreciated that in certain situations only the [0047] feature key 205 need be upgraded to increase functionality of the device if the supporting hardware exists or alternately only modules need be added or upgraded if the feature key 205 supports the addition of this new hardware. For example, a customer orders a device with only the base functionality of monitoring voltage, current and power, but later wishes to upgrade the device to monitor energy data, such as kWh. Although the device already monitors and records energy data, the feature key 205 disables the access to the data as described above. The upgraded feature key 205 enhances the functionality of the device by providing access to kWh data without the replacement of measurement hardware or the replacement of firmware.
  • In an alternate embodiment the [0048] function modules 630 a-d completely replace the authenticating and enabling hardware of the meter, by reading the feature key directly. This permits the addition of new modules that were not envisioned when the original meter was designed.
  • When [0049] function modules 630 a-d are added to the base unit 101 the module may require read access or write access or both read and write access to the register set on the base unit. This is accomplished by transferring register values between the base unit and the module. This transfer requires that the module enforce the same security restrictions as those dictated by the security key on the base unit. The flag lookup table 512 is preferably included in the firmware of the module. In order to operate correctly, the module also has access to an enabling array to act in conjunction with the flag lookup table, as outlined above.
  • FIG. 7 is a flowchart illustrating the steps involved in authenticating the activation codes with added modules. In operation the [0050] power supply 103 is disconnected from the device and the feature key 205 is replaced with an upgraded feature key, block 700. In an alternate embodiment the module may have the ability to accept an additional key that overrides the original key attached to the device. This allows a user to install an upgraded module and associated key which embodies the features and functions not envisioned or supported in the original base device. In either case an upgraded or additional feature key allows for the addition of the module functionality to the device.
  • Once the feature key has been upgraded the [0051] modules 630 are connected to the device, block 702, and the power supply is connected 704. As illustrated in FIG. 3, the device, the power supply and the modules are all connected via a bus 318, thereby allowing data transfer between them. Upon initial power up of the device, block 706, the device checks the modules to see if an additional processor, the auxiliary processor, is provided with the module, block 710. If no auxiliary processor is detected, the processor on the base unit is used for authentication purposes, block 720.
  • If an auxiliary processor is detected in the attached module, the [0052] base unit 101 searches for a feature key 205 attached to the module, block 714. If a feature key 205 is found attached to the module, the auxiliary processor is designated as the master processor for authentication purposes, block 722. If no feature key 205 is found to be attached to the module, then the device processor is designated as the master processor for authentication purposes, block 720 and the feature key located on the device is utilized.
  • Again, allowing the module to contain an auxiliary processor allows the module to act either as an extension of the original base device, and the base device's associated CPU, or act as master CPU for the entire device. Further, the ability to add a module with a [0053] feature key 205 allows the user to override the device processor and original feature key embedded and attached to the original device. This allows for ease of upgrading a device, such as firmware or software upgrades, or adding future modules to perform calculations or functions which are too advanced for the device processor to handle. In an alternate embodiment the module CPU reads the feature key 205 directly performing the required authentication, as outlined earlier.
  • The master processor for authentication purposes then goes through the same procedure as outlined in FIG. 4 blocks [0054] 410-426 for the single processor case, block 730. As before, the device is disabled 444 or, in an alternate embodiment, the IED functionality is reduced to only minimal functions, such as displaying an error message or status report. If the device is enabled, block 742 the key memory is written to an internal array, and the register control is set, block 744. Also, the enabling array is copied from the authentication master device to the slave devices, block 748. Specifically, if the module is the master, the enabling array is copied to the device. If the main unit is the master, then the enabling array is copied to the module. Next the values in the data register measured by the device are copied to the module 750 and the access table and lookup table are applied to both the module register and the device register. As before, to enable or disable access to the data in the register the lookup table flag accesses the access table and returns a ‘0’ or ‘1’ based on the index location provided by the flag, and then disables or enables the access to the associated register's data 752. The register control allows the device and the module to maintain a coherent access policy.
  • The addition of modules to the device implies a multi-processor/multi-master architecture, since either the device or the module may wish to assert control over a specific register. In a preferred embodiment the default value is all register fields, unless specified, are controlled by the [0055] device CPU 314. The device and module constantly record and update data into the respective registers, or a specific register, and the registers are copied between the device and module 760. As described earlier, a master read/write control is set between the device and module registers to ensure the appropriate data is current.
  • Devices such as Intelligent Electronic Devices (“IEDs”) and more specifically electric meters and revenue meters typically include transformers such as current transformers. IEDs include protection relays, fault recorders and electrical meters and other devices used to manage, measure and control the distribution of electric power. Electrical meters include revenue meters of the type used by energy suppliers to accurately measure electrical energy delivered to consumers for the purposes of billing and/or collecting revenue, and power quality meters having power quality monitoring, detection and reporting capabilities. [0056]
  • Current transformers are used to provide such functions as metering, relaying, and the measurement and control of the current. A current transformer usually includes a magnetic core and two windings, a primary and a secondary winding. The primary winding either passes through the core, or winds around the core, and is the wire that has current incoming from the line or attached connection. The secondary winding is wrapped around the magnetic core and produces the measured current. A change in the incoming current produces a change in the magnetic flux that induces a change in the measured current. Thus, a large incoming current has been transformed into a smaller, more easily measured current. Also, electrical isolation or physical separation between the primary incoming and secondary measured circuits has been performed. [0057]
  • According to the preferred embodiments, a method and apparatus are provided that can simplify the manufacturing process of a meter which one or more current transformers (“CTs”) are connected to the transformer circuitry on a circuit board. In one embodiment, the CTs are placed in the main meter enclosure, the primary windings being electrically insulated with a resin compound from the remainder of the electrical device. To achieve a compact device it is important that the primary windings be electrically insulated because if they are in a close proximity to the remainder of the circuitry, the device will short circuit. It can also be appreciated that voltage or potential transformers (“PTs”) can be used in place of CTs. [0058]
  • Exemplary meters include type 7500 or type 8500 power meters manufactured by Power Measurement, located in Saanichton, B.C., Canada. With respect to the meters, relevant American National Standards Institute (ANSI) standards such as ANSI 39.1 “Requirements, Electrical Analog Indicating Instruments,” specify requirements of the device, including size. But as the consumers need for a device that performs more complex functions and contains more features is imposed upon the manufacturers, the need for a more compact device that still meets the requirements of the size standards is required. An example of a size standard is a ø103 mm diameter cutout as defined by ANSI 39.1. The spacing requirements of the transformer circuitry should meet the electrical standards while still complying with relevant size requirements. According to the preferred embodiments, eliminating the transformer enclosures found in past devices can provide a compact device. Further, this method can be used to fabricate a device using fewer manufacturing steps, thus lowering production related costs and decreasing the chance of production related errors. [0059]
  • FIG. 1[0060] a, FIG. 1b and FIG. 1c show perspective views of an exemplary meter. The device 100 comprises a base 101 and a cover 102. An exemplary device is type 6200, manufactured by Power Measurement Ltd. located in Saanichton, B.C., Canada.
  • FIG. 2[0061] a shows a back view of the device 200, the base 201 having voltage connectors 205 206 207 208 209 and current connectors 220 221 222 223 224 225 inset into the base 101. In the preferred embodiment the base is injection molded plastic with the current and voltage connectors press-fit into openings in the base. It will be recognized by those skilled in the art that in other embodiments the connectors may be directly molded into the base. However a drawback of these traditional connectors can be that they do not provide the required spacing specifications while meeting the aforementioned ANSI specifications.
  • FIG. 8 shows a perspective view of the [0062] device 100 including current transformers (“CTs”) 810 a 810 b 810 c that are connected to PCB connector pins 811 a 811 b 811 c. A wire or stamped plate 812 a 812 b 812 c passes through the center of the CT 810 a 810 b 810 c, and completes the circuit formed with the current connectors 220 221 222 223 224 225 (FIG. 2a). The current connectors, voltage connectors and CTs comprise a portion of analog circuitry 312.
  • In a preferred embodiment the CTs are located in a [0063] depression 830 in the base 101, and then the depression is filled with an epoxy resin 1030 (shown in FIG. 10) having a dielectric strength that electrically insulates the CT circuitry. The dielectric strength of a material is a value, measured in units of volts/distance, of the property of the material that expresses when electrical failure or breakdown occurs. In the preferred embodiment the dielectric strength of the resin is at least 400V/mil (15750 V/mm). The CT circuitry is spaced according to IEC-61010 specifications published by the International Electrotechnical Commission in Geneva, Switzerland. The meter in a preferred embodiment requires, according to the IEC specification, spacing for a maximum of 3700V between the primary and the secondary if the device is to be specified for 300V on its current terminals. The CT circuitry is shown more clearly in upcoming FIG. 10.
  • The IEC specification also contains safety specification requirements. For example, a transformer with 300V on current primary requires 6.5 mm insulation spacing between connection points of the primary and secondary with only air as a spacing. In the preferred embodiment, the [0064] resin 1030 is Loctite® 3140/3164 Epoxy, manufactured by Loctite Corporation located in DesPlains, Ill., which contains a dielectric strength of 410 V/mil (16140 V/mm). When the CTs are encased within this resin 1030, the insulation spacing requirements are reduced from 6.5 mm to 0.21 mm. Electrically insulating the CTs allows for a more compact device. In an alternate embodiment the CTs are angled during the manufacturing process. The positioning of the CTs allows further reduction in space while still continuing to meet the spacing requirements. In order to position the CTs to optimize the electrical spacing and continue to meet the size requirement, the current connectors 220, 221, 222, 223, 224 and 225, as shown in FIG. 2a, are staggered.
  • Referring now to FIG. 9, a printed circuit board (“PCB”) [0065] 910 is fitted into the base 101, the PCB connector pins 911 a 911 b 911 c passing through openings in the PCB 910. In the preferred embodiment the PCB connectors are connectors such as TSW-103-09-G-S, manufactured by Samtec, Inc., located in New Albany, Ind. Further, in the preferred embodiment, solder is applied to the PCB such that the PCB is physically attached to the CT circuitry, and thus attaching the PCB to the base 101.
  • FIG. 10 is a sectional view A-A of FIG. 9 that illustrates the electrical connection of the CT. To assemble a [0066] CT 810 c into the base 101 the current connectors 224 225 are fitted into a depression in the base 101. A bar 812 c or other type of stamped part then connects the current connectors 224 225 together, while passing through the center of the CT 810 c. In the preferred embodiment the transformer primary circuitry is the electrical path made from the current connectors 224 225 and the bar 812 c where the secondary electrical path is made from the wire windings on the CT 810 c to the PCB connector 911 c via secondary wires shown in FIG. 8. A resin 1030, or other type of potting compound is poured into the depression, which then electrically insulates the CT 810 c and associated circuitry. Finally, the CT 810 c, which is electrically connected to the PCB connector 911 c, is soldered into the PCB 910.
  • It will be recognized by those skilled in the art that other methods of attaching the CT circuitry may also be used. For example, although it is preferable to attach the circuitry using solder connections, the [0067] PCB connector 911 c may be made using press-fit or other types of connections that require no soldering.
  • It is therefore intended that the foregoing detailed description be regarded as illustrative rather than limiting, and that it be understood that it is the following claims, including all equivalents, that are intended to define the spirit and scope of this invention. [0068]

Claims (20)

We claim:
1. An intelligent electronic device, the device comprising:
an enclosure;
connectors inset into said enclosure;
a first transformer set within the enclosure and coupled to at least one of said connectors, the first transformer including at least one winding;
analog circuitry within the enclosure and coupled to the first transformer;
a resin set within the enclosure, wherein the resin electrically insulates the at least one winding of the first transformer from at least one of the analog circuitry and the at least one connector;
a central processing unit coupled to the analog circuitry and operative to provide at least one power management function; and
at least one of a display and a communications interface coupled to the central processing unit and operative to provide access to said power management function.
2. The device of claim 1 wherein the at least one winding further includes primary windings and secondary windings.
3. The device of claim 2 wherein the resin electrically isolates the primary windings of the first transformer from the secondary windings of the first transformer.
4. The device of claim 1 further including a printed circuit board electrically connected to the first transformer.
5. The device of claim 4 wherein the analog circuitry is mounted on the printed circuit board.
6. The device of claim 5 wherein the resin electrically isolates the at least one winding of the first transformer from the electrical components of the printed circuit board.
7. The device of claim 1 wherein the at least one first transformer is selected from the group consisting of a voltage transformer, a potential transformer and a current transformer.
8. The device of claim 1 further including a second transformer located in the enclosure.
9. The device of claim 8, wherein the first transformer and the second transformer is located in the enclosure in a staggered configuration.
10. The device of claim 1 wherein the intelligent electronic device comprises a revenue meter.
11. A method for isolating electrical circuitry from at least one transformer in an intelligent electronic device, the method comprising:
providing an enclosure;
insetting connectors into said enclosure;
placing analog circuitry, a CPU and at least one of a display and a communications interface within the enclosure;
placing a first transformer within the enclosure, the transformer including at least one winding;
coupling said first transformer to at least one of said connectors and said analog circuitry; and
supplying a resin to the enclosure, wherein the resin electrically isolates the at least one winding of the first transformer from at least one of the analog circuitry and the at least one connector.
12. The method of claim 11 wherein the first transformer is selected from the group consisting of a voltage transformer, a potential transformer and a current transformer.
13. The method of claim 11 wherein the at least one winding further includes primary windings and secondary windings.
14. The method of claim 13, wherein the resin electrically isolates the primary windings of the first transformer from the secondary windings of the first transformer.
15. The method of claim 11 further including electrically connecting a printed circuit board to the first transformer.
16. The method of claim 15 further comprising mounting the analog circuitry on the printed circuit board.
17. The method of claim 16 wherein the resin electrically isolates the at least one winding of the first transformer from the electrical components of the printed circuit board.
18. The method of claim 11 further including placing at least a second transformer in the enclosure.
19. The method of claim 18 wherein the first transformer and the second transformer are placed in the enclosure in a staggered configuration.
20. The method of claim 11 wherein the intelligent electronic device comprises a revenue meter.
US10/358,036 2001-02-23 2003-02-02 Compact intelligent electronic device incorporating transformers Expired - Lifetime US6798190B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US10/358,036 US6798190B2 (en) 2001-02-23 2003-02-02 Compact intelligent electronic device incorporating transformers

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US09/791,420 US6563697B1 (en) 2001-02-23 2001-02-23 Apparatus for mounting a device on a mounting surface
US09/791,421 US7249265B2 (en) 2001-02-23 2001-02-23 Multi-featured power meter with feature key
US09/792,701 US7085824B2 (en) 2001-02-23 2001-02-23 Systems for in the field configuration of intelligent electronic devices
US10/358,036 US6798190B2 (en) 2001-02-23 2003-02-02 Compact intelligent electronic device incorporating transformers

Related Parent Applications (2)

Application Number Title Priority Date Filing Date
US09/792,701 Continuation US7085824B2 (en) 2001-02-23 2001-02-23 Systems for in the field configuration of intelligent electronic devices
US09/791,421 Continuation US7249265B2 (en) 2001-02-23 2001-02-23 Multi-featured power meter with feature key

Publications (2)

Publication Number Publication Date
US20030132742A1 true US20030132742A1 (en) 2003-07-17
US6798190B2 US6798190B2 (en) 2004-09-28

Family

ID=25153665

Family Applications (2)

Application Number Title Priority Date Filing Date
US09/791,421 Expired - Lifetime US7249265B2 (en) 2001-02-23 2001-02-23 Multi-featured power meter with feature key
US10/358,036 Expired - Lifetime US6798190B2 (en) 2001-02-23 2003-02-02 Compact intelligent electronic device incorporating transformers

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US09/791,421 Expired - Lifetime US7249265B2 (en) 2001-02-23 2001-02-23 Multi-featured power meter with feature key

Country Status (1)

Country Link
US (2) US7249265B2 (en)

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060077999A1 (en) * 2004-10-12 2006-04-13 Erran Kagan System and method for simultaneous communication on modbus and DNP 3.0 over Ethernet for electronic power meter
US20060083260A1 (en) * 2004-10-20 2006-04-20 Electro Industries/Gaugetech System and method for providing communication between intelligent electronic devices via an open channel
US20070096942A1 (en) * 2005-10-28 2007-05-03 Electro Industries/Gauge Tech. Intelligent electronic device having an XML-based graphical interface
US20070114987A1 (en) * 2005-10-28 2007-05-24 Electro Industries/Gauge Tech. Intelligent electronic device for providing broadband Internet access
US7747733B2 (en) 2004-10-25 2010-06-29 Electro Industries/Gauge Tech Power meter having multiple ethernet ports
US20110266871A1 (en) * 2010-05-03 2011-11-03 Jan Thisted Power Interchange system for interchanging electric energy between a battery and an electric grid, method for interchanging electric energy between a battery and an electric grid and application of the power interchange system
WO2012033695A1 (en) * 2010-09-09 2012-03-15 Schneider Electric USA, Inc. Compact electrical power meter
US8442660B2 (en) 2005-10-28 2013-05-14 Electro Industries/Gauge Tech Intelligent electronic device having audible and visual interface
US8515348B2 (en) 2005-10-28 2013-08-20 Electro Industries/Gauge Tech Bluetooth-enable intelligent electronic device
US9063181B2 (en) 2006-12-29 2015-06-23 Electro Industries/Gauge Tech Memory management for an intelligent electronic device
US20150241480A1 (en) * 2012-09-28 2015-08-27 Schneider Electric USA, Inc. Power meter configured for rear and side expansion
US9885739B2 (en) 2006-12-29 2018-02-06 Electro Industries/Gauge Tech Intelligent electronic device capable of operating as a USB master device and a USB slave device
US9927470B2 (en) 2014-05-22 2018-03-27 Electro Industries/Gauge Tech Intelligent electronic device having a memory structure for preventing data loss upon power loss
US10330713B2 (en) 2012-12-21 2019-06-25 Electro Industries/Gauge Tech Intelligent electronic device having a touch sensitive user interface
US10474591B2 (en) 2009-12-01 2019-11-12 Electro Industries/Gauge Tech Electronic meter with a removable protective plug
US10628053B2 (en) 2004-10-20 2020-04-21 Electro Industries/Gauge Tech Intelligent electronic device for receiving and sending data at high speeds over a network
US10641618B2 (en) 2004-10-20 2020-05-05 Electro Industries/Gauge Tech On-line web accessed energy meter
CN111240741A (en) * 2020-01-16 2020-06-05 南方电网科学研究院有限责任公司 Transplantable electric power functional module
CN111487446A (en) * 2019-01-25 2020-08-04 福迪威(上海)工业仪器技术研发有限公司 Electronic measuring device
US10845399B2 (en) 2007-04-03 2020-11-24 Electro Industries/Gaugetech System and method for performing data transfers in an intelligent electronic device
US11009922B2 (en) 2015-02-27 2021-05-18 Electro Industries/Gaugetech Wireless intelligent electronic device
USD939988S1 (en) 2019-09-26 2022-01-04 Electro Industries/Gauge Tech Electronic power meter
WO2022154974A1 (en) * 2021-01-15 2022-07-21 Amir Khalaji Modular upgradable low voltage power supply
US11644341B2 (en) 2015-02-27 2023-05-09 El Electronics Llc Intelligent electronic device with hot swappable battery

Families Citing this family (52)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050049801A1 (en) * 1996-07-05 2005-03-03 Stefan Lindberg Analysis system
US7085824B2 (en) * 2001-02-23 2006-08-01 Power Measurement Ltd. Systems for in the field configuration of intelligent electronic devices
US7253732B2 (en) * 2001-09-10 2007-08-07 Osann Jr Robert Home intrusion confrontation avoidance system
US6993417B2 (en) * 2001-09-10 2006-01-31 Osann Jr Robert System for energy sensing analysis and feedback
EP1474662B1 (en) 2002-01-18 2011-07-27 SPM Instrument AB Analysis systems for analysing the condition of a machine
US7444207B2 (en) 2002-10-15 2008-10-28 Rain Bird Corporation Modular and expandable irrigation controller
US7681247B2 (en) * 2003-02-27 2010-03-16 Sun Microsystems, Inc. Anti-theft system and method for semiconductor devices and other electronic components
BR0304762A (en) * 2003-10-28 2005-08-09 Elucid Partners S A Tamper-proof integrated system with optical device to enable remote reading of the electricity consumption measured in the distribution network and tamper-proof device for system operation
CN1914573B (en) 2003-12-23 2011-05-04 雷鸟有限公司 Modular irrigation controller and expandable module
US7844367B2 (en) * 2003-12-23 2010-11-30 Rain Bird Corporation Code replacement for irrigation controllers
US7271996B2 (en) * 2004-12-03 2007-09-18 Electro Industries/Gauge Tech Current inputs interface for an electrical device
US7721321B2 (en) * 2004-12-04 2010-05-18 Schweitzer Engineering Laboratories, Inc. Method and apparatus for reducing communication system downtime when configuring a cryptographic system of the communication system
US7818735B1 (en) * 2005-06-09 2010-10-19 Emc Corporation System and method for enabling access and use of software installed on a data storage system
US8024724B2 (en) 2006-08-31 2011-09-20 Itron, Inc. Firmware download
US20080147227A1 (en) * 2006-10-31 2008-06-19 Delaney William P Systems and methods for improved product variant configuration and distribution in hub-based distribution
US7877169B2 (en) * 2007-08-21 2011-01-25 Electro Industries/ Gauge Tech System and method for synchronizing an auxiliary electrical generator to an electrical system
US9136711B2 (en) 2007-08-21 2015-09-15 Electro Industries/Gauge Tech System and method for synchronizing multiple generators with an electrical power distribution system
US8493231B2 (en) * 2007-09-07 2013-07-23 Power Measurement Ltd. Power meter having fault tolerance
US20090089588A1 (en) * 2007-09-28 2009-04-02 Farid Adrangi Method and apparatus for providing anti-theft solutions to a computing system
US8024492B2 (en) * 2008-12-23 2011-09-20 Schneider Electric USA, Inc. System for managing a power monitoring system containing a multiplicity of intelligent electronic devices
US20100321153A1 (en) * 2009-06-22 2010-12-23 Consolidated Edison Company Of New York, Inc. Apparatus and method for performing a sequence of operational instructions
EP2536063B1 (en) * 2010-02-11 2018-06-20 LG Electronics Inc. Power management network system
JP2012221057A (en) * 2011-04-05 2012-11-12 Sharp Corp Electronic apparatus system and electronic apparatus
US8812979B2 (en) 2011-05-11 2014-08-19 General Electric Company Feature license management system
US10771532B2 (en) 2011-10-04 2020-09-08 Electro Industries/Gauge Tech Intelligent electronic devices, systems and methods for communicating messages over a network
US10862784B2 (en) 2011-10-04 2020-12-08 Electro Industries/Gauge Tech Systems and methods for processing meter information in a network of intelligent electronic devices
US10275840B2 (en) 2011-10-04 2019-04-30 Electro Industries/Gauge Tech Systems and methods for collecting, analyzing, billing, and reporting data from intelligent electronic devices
US10303860B2 (en) * 2011-10-04 2019-05-28 Electro Industries/Gauge Tech Security through layers in an intelligent electronic device
CN103152176B (en) * 2013-01-31 2015-06-24 成都秦川科技发展有限公司 Intelligent gas meter information security management module of internet of things
CN103152175B (en) * 2013-01-31 2015-12-02 成都秦川科技发展有限公司 Remote-control intelligent gas meter information security management module
US11816465B2 (en) 2013-03-15 2023-11-14 Ei Electronics Llc Devices, systems and methods for tracking and upgrading firmware in intelligent electronic devices
CN104579634A (en) * 2013-03-19 2015-04-29 成都秦川科技发展有限公司 Remote control intelligent heat meter information safety management module
CN103152166B (en) * 2013-03-19 2015-08-26 成都秦川科技发展有限公司 Remote-control intelligent water meter information security management module
CN103200570B (en) * 2013-03-19 2015-08-26 成都秦川科技发展有限公司 Intelligent water meter of Internet of things information security management module
CN103312492A (en) * 2013-05-09 2013-09-18 成都秦川科技发展有限公司 Information security management module of remote-control intelligent heat meter
CN103259648A (en) * 2013-05-09 2013-08-21 成都秦川科技发展有限公司 Information security management module of intelligent heat meter of internet of things
CN103312493A (en) * 2013-05-09 2013-09-18 成都秦川科技发展有限公司 Internet-of-things intelligent heat meter embedded with information safety management module
US9276750B2 (en) * 2013-07-23 2016-03-01 Intel Corporation Secure processing environment measurement and attestation
US11734396B2 (en) 2014-06-17 2023-08-22 El Electronics Llc Security through layers in an intelligent electronic device
USD813699S1 (en) * 2015-11-17 2018-03-27 Rootech Inc. Digital power meter
US10958435B2 (en) 2015-12-21 2021-03-23 Electro Industries/ Gauge Tech Providing security in an intelligent electronic device
US10430263B2 (en) 2016-02-01 2019-10-01 Electro Industries/Gauge Tech Devices, systems and methods for validating and upgrading firmware in intelligent electronic devices
USD810599S1 (en) * 2016-03-28 2018-02-20 Lsis Co., Ltd. Electricity meter for distribution board
CN105843143A (en) * 2016-03-31 2016-08-10 国网山东省电力公司栖霞市供电公司 Electric power terminal device and intelligent monitoring method thereof
CN107896216B (en) * 2017-11-24 2019-11-26 广东电网有限责任公司东莞供电局 A kind of key management, data encryption and the identity identifying method of electric power measuring instrument
US11686594B2 (en) 2018-02-17 2023-06-27 Ei Electronics Llc Devices, systems and methods for a cloud-based meter management system
US11754997B2 (en) 2018-02-17 2023-09-12 Ei Electronics Llc Devices, systems and methods for predicting future consumption values of load(s) in power distribution systems
US11734704B2 (en) 2018-02-17 2023-08-22 Ei Electronics Llc Devices, systems and methods for the collection of meter data in a common, globally accessible, group of servers, to provide simpler configuration, collection, viewing, and analysis of the meter data
CN108470193A (en) * 2018-03-27 2018-08-31 国网河北省电力有限公司电力科学研究院 Electrical energy meter fault diagnostic method, system and terminal device
US11863589B2 (en) 2019-06-07 2024-01-02 Ei Electronics Llc Enterprise security in meters
CN112769686B (en) * 2019-11-05 2021-11-12 应急管理部通信信息中心 Intelligent Internet of things gateway and data transmission method
US20230004646A1 (en) * 2021-06-30 2023-01-05 Honeywell International Inc. Method and system for configuring a feature for an energy meter as legally important or legally non-important

Citations (50)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3970932A (en) * 1974-09-03 1976-07-20 I-T-E Imperial Corporation Hot line detection system for high voltage switchgear
US4074193A (en) * 1973-12-20 1978-02-14 Siemens Aktiengesellschaft Combined current and voltage measuring apparatus
US4225839A (en) * 1978-01-27 1980-09-30 Westinghouse Electric Corp. Current transformer
US4671697A (en) * 1984-05-09 1987-06-09 Mitsubishi Denki Kabushiki Kaisha Apparatus for mounting electrical appliance on frame
US4900275A (en) * 1989-05-18 1990-02-13 Carlingswitch, Inc. DIN rail mountable circuit breaker
US4957876A (en) * 1987-06-05 1990-09-18 Nippondenso Co., Ltd. Resin sealed semiconductor device and a method for making the same
US5001420A (en) * 1989-09-25 1991-03-19 General Electric Company Modular construction for electronic energy meter
US5056214A (en) * 1989-12-19 1991-10-15 Mark Iv Industries, Inc Method of making a molded transformer enclosure
US5192227A (en) * 1991-12-23 1993-03-09 Square D Company Din rail mounting bracket
US5248967A (en) * 1991-04-26 1993-09-28 Marek Daneshfar Method and apparatus for monitoring electrical devices
US5301122A (en) * 1992-02-12 1994-04-05 Measuring And Monitoring, Inc. Measuring and monitoring system
US5418752A (en) * 1989-04-13 1995-05-23 Sundisk Corporation Flash EEPROM system with erase sector select
US5418837A (en) * 1993-07-30 1995-05-23 Ericsson-Ge Mobile Communications Inc. Method and apparatus for upgrading cellular mobile telephones
US5548527A (en) * 1992-02-21 1996-08-20 Abb Power T&D Company Inc. Programmable electrical energy meter utilizing a non-volatile memory
US5554312A (en) * 1995-01-13 1996-09-10 Ashland Photoresist stripping composition
US5596467A (en) * 1993-04-05 1997-01-21 Yamamoto; Makoto Electrical energy-transforming equipment
US5602363A (en) * 1993-09-07 1997-02-11 Watlow/Winona, Inc. Din rail mounted enclosure
US5654081A (en) * 1995-07-05 1997-08-05 Ford Motor Company Integrated circuit assembly with polymeric underfill body
US5704805A (en) * 1995-03-31 1998-01-06 The Whitaker Corporation Connector for connection to a rail
US5736847A (en) * 1994-12-30 1998-04-07 Cd Power Measurement Limited Power meter for determining parameters of muliphase power lines
US5767790A (en) * 1996-03-07 1998-06-16 Jovellana; Bartolome D. Automatic utility meter monitor
US5880927A (en) * 1994-03-17 1999-03-09 Siemens Energy & Automation, Inc. Circuit breaker fastener
US5896393A (en) * 1996-05-23 1999-04-20 Advanced Micro Devices, Inc. Simplified file management scheme for flash memory
US5897607A (en) * 1997-02-28 1999-04-27 Jenney Systems Associates, Ltd. Automatic meter reading system
US5904592A (en) * 1998-09-29 1999-05-18 Allen-Bradley Company, Llc Dual mode din rail latch with tactile feedback
US5907476A (en) * 1997-08-29 1999-05-25 Allen-Bradley Company, Llc Self-locking rail securement device
US5933004A (en) * 1996-05-23 1999-08-03 Siemens Power Transmission & Distribution, Llc Low profile modular revenue meter
US5994892A (en) * 1996-07-31 1999-11-30 Sacramento Municipal Utility District Integrated circuit design automatic utility meter: apparatus & method
US5995911A (en) * 1997-02-12 1999-11-30 Power Measurement Ltd. Digital sensor apparatus and system for protection, control, and management of electricity distribution systems
US6000034A (en) * 1997-05-06 1999-12-07 Power Measurement Ltd. Security system and method for revenue class electricity meter
US6008711A (en) * 1998-01-09 1999-12-28 Siemens Power Transmission & Distribution Method and arrangement for securing a current transformer to an electric utility meter housing
US6059129A (en) * 1997-02-28 2000-05-09 Entrelec S.A. Clamping arrangement of an equipment module on a supporting rail and module for such an arrangement
US6064192A (en) * 1998-04-08 2000-05-16 Ohio Semitronics Revenue meter with integral current transformer
US6088659A (en) * 1997-09-11 2000-07-11 Abb Power T&D Company Inc. Automated meter reading system
US6182170B1 (en) * 1997-04-11 2001-01-30 Samsung Electronics Co., Ltd. Method for replacing program in portable information terminal using utility program and new program received via communication unit and determining utility program appropriateness for replacement
US6199068B1 (en) * 1997-09-11 2001-03-06 Abb Power T&D Company Inc. Mapping interface for a distributed server to translate between dissimilar file formats
US6212278B1 (en) * 1992-12-02 2001-04-03 Scientific-Atlanta, Inc. Reprogrammable subscriber terminal
US6219656B1 (en) * 1998-11-25 2001-04-17 Schlumberger Resource Management Services, Inc. Memory integrity for meters
US6239589B1 (en) * 1996-09-25 2001-05-29 Siemens Aktiengesellschaft Method and device for compensating for angle errors when measuring electrical power
US6262672B1 (en) * 1998-08-14 2001-07-17 General Electric Company Reduced cost automatic meter reading system and method using locally communicating utility meters
US6275168B1 (en) * 1997-05-23 2001-08-14 Siemens Power Transmission And Distribution, Llc Expansion module for modular meter
US6301527B1 (en) * 1996-04-03 2001-10-09 General Electric Company Utilities communications architecture compliant power management control system
US6367023B2 (en) * 1998-12-23 2002-04-02 Intel Corporation Method and apparatus of measuring current, voltage, or duty cycle of a power supply to manage power consumption in a computer system
US6401054B1 (en) * 1998-12-28 2002-06-04 General Electric Company Method of statistical analysis in an intelligent electronic device
US6459175B1 (en) * 1997-11-17 2002-10-01 Patrick H. Potega Universal power supply
US6459997B1 (en) * 1998-12-28 2002-10-01 General Electric Company Method for event analysis at an intelligent electronic device
US6486652B1 (en) * 1999-06-30 2002-11-26 General Electric Company High function, user configurable electricity meter
US6493644B1 (en) * 1999-08-09 2002-12-10 Power Measurement Ltd. A-base revenue meter with power quality features
US6496342B1 (en) * 1999-02-12 2002-12-17 Bitronics Inc. Distributed monitoring and protection system for a distributed power network
US6657424B1 (en) * 2000-04-24 2003-12-02 Siemens Power Transmission & Distribution, Inc. DC load detection in an electric utility meter

Family Cites Families (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS58198332A (en) 1982-05-13 1983-11-18 富士通株式会社 Ultrasonic diagnostic apparatus
US5745044A (en) * 1990-05-11 1998-04-28 Medeco Security Locks, Inc. Electronic security system
FR2662553B1 (en) 1990-05-28 1992-08-28 Legrand Sa ELECTRICAL APPARATUS TO BE RETAINED ON A SUPPORT BY SIMPLE LATCHING.
US5568398A (en) * 1993-12-10 1996-10-22 Siemens Energy & Automation, Inc. Electronic operations counter for a voltage regulator controller
US5544312A (en) 1994-04-29 1996-08-06 Intel Corporation Method of detecting loss of power during block erasure and while writing sector data to a solid state disk
JPH0878259A (en) 1994-09-08 1996-03-22 Fuji Electric Co Ltd Current transformer-zero-phase current transformer unit
DE69535577T2 (en) * 1994-12-22 2008-03-06 Intel Corp., Santa Clara PERFORMANCE MANAGEMENT WITH CHARACTERISTIC PERFORMANCE CONSUMPTION OF A DEVICE
AU4610496A (en) * 1994-12-22 1996-07-10 Intel Corporation System power consumption tracking and reporting
US5680324A (en) * 1995-04-07 1997-10-21 Schweitzer Engineering Laboratories, Inc. Communications processor for electric power substations
US5664202A (en) * 1995-04-20 1997-09-02 C & C Tech Ets Intelligent power consumption monitoring and control system
US5627759A (en) * 1995-05-31 1997-05-06 Process Systems, Inc. Electrical energy meters having real-time power quality measurement and reporting capability
JPH09223630A (en) 1996-02-15 1997-08-26 Meidensha Corp Resin-molded winding type current transformer
US6262572B1 (en) * 1996-07-25 2001-07-17 Seagate Technology Llc Thermo-resistive glide test head for disc drive recording media
US7216043B2 (en) * 1997-02-12 2007-05-08 Power Measurement Ltd. Push communications architecture for intelligent electronic devices
JP3520181B2 (en) 1997-05-12 2004-04-19 東芝エフエーシステムエンジニアリング株式会社 Mold type current transformer
US6219046B1 (en) * 1998-09-17 2001-04-17 General Electric Company Man-machine interface for a virtual annunciator panel display
US6564332B1 (en) * 1998-12-23 2003-05-13 Intel Corporation Method and apparatus for managing power consumption in a computer system responsive to the power delivery specifications of a power outlet
WO2001001366A2 (en) * 1999-06-25 2001-01-04 Telemonitor, Inc. Smart remote monitoring system and method
EP1108219A4 (en) 1999-06-30 2003-08-13 Gen Electric Electronic electricity meter including flash memory
EP1118003A4 (en) 1999-06-30 2003-08-13 Gen Electric Methods and apparatus for defining meter data calculations in an electronic electricity meter
CA2340889C (en) 1999-06-30 2010-09-07 General Electric Company Methods and apparatus for meter i/o board addressing and communication
AU6060700A (en) 1999-06-30 2001-01-31 General Electric Company Methods and apparatus for metering energy consumption
EP1116039A4 (en) 1999-06-30 2003-08-13 Gen Electric Methods and apparatus for updating firmware in an electronic electricity meter
DE60042309D1 (en) 1999-06-30 2009-07-16 Gen Electric METHOD AND DEVICE FOR DATA FLOW CONTROL IN AN ELECTRICITY METER
US6397155B1 (en) * 1999-08-09 2002-05-28 Power Measurement Ltd. Method and apparatus for automatically controlled gain switching of monitors
EP1257832A4 (en) 2000-01-26 2006-01-11 Elster Electricity Llc System and method for digitally compensating frequency and temperature induced errors in amplitude and phase shift in current sensing of electronic energy meters
US6587873B1 (en) * 2000-01-26 2003-07-01 Viaclix, Inc. System server for channel-based internet network
JP3982973B2 (en) 2000-03-07 2007-09-26 東光電気株式会社 Current transformer

Patent Citations (53)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4074193A (en) * 1973-12-20 1978-02-14 Siemens Aktiengesellschaft Combined current and voltage measuring apparatus
US3970932A (en) * 1974-09-03 1976-07-20 I-T-E Imperial Corporation Hot line detection system for high voltage switchgear
US4225839A (en) * 1978-01-27 1980-09-30 Westinghouse Electric Corp. Current transformer
US4671697A (en) * 1984-05-09 1987-06-09 Mitsubishi Denki Kabushiki Kaisha Apparatus for mounting electrical appliance on frame
US4957876A (en) * 1987-06-05 1990-09-18 Nippondenso Co., Ltd. Resin sealed semiconductor device and a method for making the same
US5418752A (en) * 1989-04-13 1995-05-23 Sundisk Corporation Flash EEPROM system with erase sector select
US5936971A (en) * 1989-04-13 1999-08-10 Sandisk Corporation Multi-state flash EEprom system with cache memory
US4900275A (en) * 1989-05-18 1990-02-13 Carlingswitch, Inc. DIN rail mountable circuit breaker
US5001420A (en) * 1989-09-25 1991-03-19 General Electric Company Modular construction for electronic energy meter
US5056214A (en) * 1989-12-19 1991-10-15 Mark Iv Industries, Inc Method of making a molded transformer enclosure
US5248967A (en) * 1991-04-26 1993-09-28 Marek Daneshfar Method and apparatus for monitoring electrical devices
US5192227A (en) * 1991-12-23 1993-03-09 Square D Company Din rail mounting bracket
US5301122A (en) * 1992-02-12 1994-04-05 Measuring And Monitoring, Inc. Measuring and monitoring system
US5548527A (en) * 1992-02-21 1996-08-20 Abb Power T&D Company Inc. Programmable electrical energy meter utilizing a non-volatile memory
US5555508A (en) * 1992-02-21 1996-09-10 Abb Power T&D Company Inc. Programmable electrical energy meter and methods therefor
US6212278B1 (en) * 1992-12-02 2001-04-03 Scientific-Atlanta, Inc. Reprogrammable subscriber terminal
US5596467A (en) * 1993-04-05 1997-01-21 Yamamoto; Makoto Electrical energy-transforming equipment
US5418837A (en) * 1993-07-30 1995-05-23 Ericsson-Ge Mobile Communications Inc. Method and apparatus for upgrading cellular mobile telephones
US5602363A (en) * 1993-09-07 1997-02-11 Watlow/Winona, Inc. Din rail mounted enclosure
US5880927A (en) * 1994-03-17 1999-03-09 Siemens Energy & Automation, Inc. Circuit breaker fastener
US6185508B1 (en) * 1994-12-30 2001-02-06 Power Measurement, Ltd. Power meter for determining parameters of multi-phase power lines
US5736847A (en) * 1994-12-30 1998-04-07 Cd Power Measurement Limited Power meter for determining parameters of muliphase power lines
US5554312A (en) * 1995-01-13 1996-09-10 Ashland Photoresist stripping composition
US5704805A (en) * 1995-03-31 1998-01-06 The Whitaker Corporation Connector for connection to a rail
US5654081A (en) * 1995-07-05 1997-08-05 Ford Motor Company Integrated circuit assembly with polymeric underfill body
US5767790A (en) * 1996-03-07 1998-06-16 Jovellana; Bartolome D. Automatic utility meter monitor
US6301527B1 (en) * 1996-04-03 2001-10-09 General Electric Company Utilities communications architecture compliant power management control system
US5933004A (en) * 1996-05-23 1999-08-03 Siemens Power Transmission & Distribution, Llc Low profile modular revenue meter
US5896393A (en) * 1996-05-23 1999-04-20 Advanced Micro Devices, Inc. Simplified file management scheme for flash memory
US5994892A (en) * 1996-07-31 1999-11-30 Sacramento Municipal Utility District Integrated circuit design automatic utility meter: apparatus & method
US6239589B1 (en) * 1996-09-25 2001-05-29 Siemens Aktiengesellschaft Method and device for compensating for angle errors when measuring electrical power
US5995911A (en) * 1997-02-12 1999-11-30 Power Measurement Ltd. Digital sensor apparatus and system for protection, control, and management of electricity distribution systems
US5897607A (en) * 1997-02-28 1999-04-27 Jenney Systems Associates, Ltd. Automatic meter reading system
US6059129A (en) * 1997-02-28 2000-05-09 Entrelec S.A. Clamping arrangement of an equipment module on a supporting rail and module for such an arrangement
US6182170B1 (en) * 1997-04-11 2001-01-30 Samsung Electronics Co., Ltd. Method for replacing program in portable information terminal using utility program and new program received via communication unit and determining utility program appropriateness for replacement
US6000034A (en) * 1997-05-06 1999-12-07 Power Measurement Ltd. Security system and method for revenue class electricity meter
US6275168B1 (en) * 1997-05-23 2001-08-14 Siemens Power Transmission And Distribution, Llc Expansion module for modular meter
US5907476A (en) * 1997-08-29 1999-05-25 Allen-Bradley Company, Llc Self-locking rail securement device
US6088659A (en) * 1997-09-11 2000-07-11 Abb Power T&D Company Inc. Automated meter reading system
US6199068B1 (en) * 1997-09-11 2001-03-06 Abb Power T&D Company Inc. Mapping interface for a distributed server to translate between dissimilar file formats
US6459175B1 (en) * 1997-11-17 2002-10-01 Patrick H. Potega Universal power supply
US6008711A (en) * 1998-01-09 1999-12-28 Siemens Power Transmission & Distribution Method and arrangement for securing a current transformer to an electric utility meter housing
US6064192A (en) * 1998-04-08 2000-05-16 Ohio Semitronics Revenue meter with integral current transformer
US6262672B1 (en) * 1998-08-14 2001-07-17 General Electric Company Reduced cost automatic meter reading system and method using locally communicating utility meters
US5904592A (en) * 1998-09-29 1999-05-18 Allen-Bradley Company, Llc Dual mode din rail latch with tactile feedback
US6219656B1 (en) * 1998-11-25 2001-04-17 Schlumberger Resource Management Services, Inc. Memory integrity for meters
US6367023B2 (en) * 1998-12-23 2002-04-02 Intel Corporation Method and apparatus of measuring current, voltage, or duty cycle of a power supply to manage power consumption in a computer system
US6401054B1 (en) * 1998-12-28 2002-06-04 General Electric Company Method of statistical analysis in an intelligent electronic device
US6459997B1 (en) * 1998-12-28 2002-10-01 General Electric Company Method for event analysis at an intelligent electronic device
US6496342B1 (en) * 1999-02-12 2002-12-17 Bitronics Inc. Distributed monitoring and protection system for a distributed power network
US6486652B1 (en) * 1999-06-30 2002-11-26 General Electric Company High function, user configurable electricity meter
US6493644B1 (en) * 1999-08-09 2002-12-10 Power Measurement Ltd. A-base revenue meter with power quality features
US6657424B1 (en) * 2000-04-24 2003-12-02 Siemens Power Transmission & Distribution, Inc. DC load detection in an electric utility meter

Cited By (53)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060077999A1 (en) * 2004-10-12 2006-04-13 Erran Kagan System and method for simultaneous communication on modbus and DNP 3.0 over Ethernet for electronic power meter
US7609719B2 (en) 2004-10-12 2009-10-27 Electro Industries/Gauge Tech System and method for simultaneous communication on modbus and DNP 3.0 over Ethernet for electronic power meter
US20100046545A1 (en) * 2004-10-12 2010-02-25 Electro Industries/Gauge Tech System and method for simultaneous communication on modbus and dnp 3.0 over ethernet for electronic power meter
US9705703B2 (en) 2004-10-12 2017-07-11 Electro Industries/Gauge Tech System and method for simultaneous communication on Modbus and DNP 3.0 over Ethernet for electronic power meter
US8189617B2 (en) 2004-10-12 2012-05-29 Electro Industries/Gauge Tech System and method for simultaneous communication on Modbus and DNP 3.0 over Ethernet for electronic power meter
US10628053B2 (en) 2004-10-20 2020-04-21 Electro Industries/Gauge Tech Intelligent electronic device for receiving and sending data at high speeds over a network
US20060083260A1 (en) * 2004-10-20 2006-04-20 Electro Industries/Gaugetech System and method for providing communication between intelligent electronic devices via an open channel
US11754418B2 (en) 2004-10-20 2023-09-12 Ei Electronics Llc On-line web accessed energy meter
US10641618B2 (en) 2004-10-20 2020-05-05 Electro Industries/Gauge Tech On-line web accessed energy meter
US7616656B2 (en) 2004-10-20 2009-11-10 Electron Industries / Gauge Tech System and method for providing communication between intelligent electronic devices via an open channel
US20100054276A1 (en) * 2004-10-20 2010-03-04 Electro Industries/Gauge Tech. System and method for providing communication between intelligent electronic devices via an open channel
US8107491B2 (en) * 2004-10-20 2012-01-31 Electro Industries/Gauge Tech System and method for providing communication between intelligent electronic devices via an open channel
US7747733B2 (en) 2004-10-25 2010-06-29 Electro Industries/Gauge Tech Power meter having multiple ethernet ports
US20110054814A1 (en) * 2004-10-25 2011-03-03 Electro Industries/Gauge Tech Power meter having multiple ethernet ports
US11686749B2 (en) 2004-10-25 2023-06-27 El Electronics Llc Power meter having multiple ethernet ports
US9194720B2 (en) 2004-10-25 2015-11-24 Electro Industries/Gauge Tech Power meter having multiple Ethernet ports
US8176174B2 (en) 2004-10-25 2012-05-08 Electro Industries/Gauge Tech Power meter having multiple ethernet ports
US8022690B2 (en) 2005-10-28 2011-09-20 Electro Industries/Gauge Tech Intelligent electronic device for providing broadband internet access
US9322669B2 (en) 2005-10-28 2016-04-26 Electro Industries/Gauge Tech Intelligent electronic device having audible and visual interface
US8442660B2 (en) 2005-10-28 2013-05-14 Electro Industries/Gauge Tech Intelligent electronic device having audible and visual interface
US8515348B2 (en) 2005-10-28 2013-08-20 Electro Industries/Gauge Tech Bluetooth-enable intelligent electronic device
US20070096942A1 (en) * 2005-10-28 2007-05-03 Electro Industries/Gauge Tech. Intelligent electronic device having an XML-based graphical interface
US8907657B2 (en) 2005-10-28 2014-12-09 Electro Industries/Gauge Tech Intelligent electronic device for providing broadband internet access
US20070114987A1 (en) * 2005-10-28 2007-05-24 Electro Industries/Gauge Tech. Intelligent electronic device for providing broadband Internet access
US8933815B2 (en) 2005-10-28 2015-01-13 Electro Industries/Gauge Tech Intelligent electronic device having an XML-based graphical interface
US9891253B2 (en) 2005-10-28 2018-02-13 Electro Industries/Gauge Tech Bluetooth-enabled intelligent electronic device
US9678122B2 (en) 2005-10-28 2017-06-13 Electro Industries/Gauge Tech Intelligent electronic device for providing broadband internet access
US20090265124A1 (en) * 2005-10-28 2009-10-22 Electro Industries/Gauge Tech Intelligent Electronic Device for Providing Broadband Internet Access
US7554320B2 (en) 2005-10-28 2009-06-30 Electro Industries/Gauge Tech. Intelligent electronic device for providing broadband internet access
US9063181B2 (en) 2006-12-29 2015-06-23 Electro Industries/Gauge Tech Memory management for an intelligent electronic device
US9885739B2 (en) 2006-12-29 2018-02-06 Electro Industries/Gauge Tech Intelligent electronic device capable of operating as a USB master device and a USB slave device
US10845399B2 (en) 2007-04-03 2020-11-24 Electro Industries/Gaugetech System and method for performing data transfers in an intelligent electronic device
US11635455B2 (en) 2007-04-03 2023-04-25 El Electronics Llc System and method for performing data transfers in an intelligent electronic device
US10474591B2 (en) 2009-12-01 2019-11-12 Electro Industries/Gauge Tech Electronic meter with a removable protective plug
AU2011202020A8 (en) * 2010-05-03 2015-06-11 Siemens Gamesa Renewable Energy A/S Power interchange system for interchanging electric energy between a battery and an electric grid, method for interchanging electric energy between a battery and an electric grid and application of the power interchange system
US20110266871A1 (en) * 2010-05-03 2011-11-03 Jan Thisted Power Interchange system for interchanging electric energy between a battery and an electric grid, method for interchanging electric energy between a battery and an electric grid and application of the power interchange system
US8922056B2 (en) * 2010-05-03 2014-12-30 Siemens Aktiengesellschaft Power interchange system for interchanging electric energy between a battery and an electric grid, method for interchanging electric energy between a battery and an electric grid and application of the power interchange system
AU2011202020B2 (en) * 2010-05-03 2015-01-15 Siemens Gamesa Renewable Energy A/S Power interchange system for interchanging electric energy between a battery and an electric grid, method for interchanging electric energy between a battery and an electric grid and application of the power interchange system
CN103080751A (en) * 2010-09-09 2013-05-01 施耐德电气美国股份有限公司 Compact electrical power meter
US8704509B2 (en) 2010-09-09 2014-04-22 Schneider Electric USA, Inc. Compact electrical power meter
WO2012033695A1 (en) * 2010-09-09 2012-03-15 Schneider Electric USA, Inc. Compact electrical power meter
US20150241480A1 (en) * 2012-09-28 2015-08-27 Schneider Electric USA, Inc. Power meter configured for rear and side expansion
US9632112B2 (en) * 2012-09-28 2017-04-25 Schneider Electric USA, Inc. Power meter configured for rear and side expansion
US10330713B2 (en) 2012-12-21 2019-06-25 Electro Industries/Gauge Tech Intelligent electronic device having a touch sensitive user interface
US9927470B2 (en) 2014-05-22 2018-03-27 Electro Industries/Gauge Tech Intelligent electronic device having a memory structure for preventing data loss upon power loss
US11009922B2 (en) 2015-02-27 2021-05-18 Electro Industries/Gaugetech Wireless intelligent electronic device
US11644341B2 (en) 2015-02-27 2023-05-09 El Electronics Llc Intelligent electronic device with hot swappable battery
US11641052B2 (en) 2015-02-27 2023-05-02 El Electronics Llc Wireless intelligent electronic device
CN111487446A (en) * 2019-01-25 2020-08-04 福迪威(上海)工业仪器技术研发有限公司 Electronic measuring device
US11162985B2 (en) * 2019-01-25 2021-11-02 Fluke Corporation Electronic measuring device
USD939988S1 (en) 2019-09-26 2022-01-04 Electro Industries/Gauge Tech Electronic power meter
CN111240741A (en) * 2020-01-16 2020-06-05 南方电网科学研究院有限责任公司 Transplantable electric power functional module
WO2022154974A1 (en) * 2021-01-15 2022-07-21 Amir Khalaji Modular upgradable low voltage power supply

Also Published As

Publication number Publication date
US20030110380A1 (en) 2003-06-12
US7249265B2 (en) 2007-07-24
US6798190B2 (en) 2004-09-28

Similar Documents

Publication Publication Date Title
US6798190B2 (en) Compact intelligent electronic device incorporating transformers
US6000034A (en) Security system and method for revenue class electricity meter
US20160370204A1 (en) Wireless intelligent electronic device
US6871150B2 (en) Expandable intelligent electronic device
AU2011226800B2 (en) Systems, methods, and apparatus for components in AMI energy meters
US10739162B2 (en) Intelligent electronic device with surge supression
US6813571B2 (en) Apparatus and method for seamlessly upgrading the firmware of an intelligent electronic device
US6745138B2 (en) Intelligent electronic device with assured data storage on powerdown
CN104704696A (en) Circuit breaker panel
US11641052B2 (en) Wireless intelligent electronic device
US20020084914A1 (en) Revenue meter arrangement having sensors in mounting device
CN104620447B (en) For forming the plug connector of socket connection
US7199572B1 (en) Method and system for improving the operational safety, reliability, and functionality of electrical power consumption monitoring devices
CN105632557A (en) Electricity amount management IC burn upgrading method, device and system
JP2024019410A (en) Tamper resistant circuit
CN101738515B (en) Modular electric energy meter device and method for realizing same
TW494717B (en) Modular extensible peripheral equipment with self-supporting construction
AU2009100471B4 (en) Meter and communications apparatus
CN208506544U (en) A kind of case change measure and control device that can automatically switch direct-flow input signal type
EP4016093A1 (en) Smart energy meter housing
CN101194472B (en) Measuring or protecting device with independent software module
CN212933297U (en) Protective device for industrial control system
CN107292182A (en) A kind of semiconductor equipment control system hot plug is anti-to crack tailored version hardware encipherment protection device
CN108594721A (en) A kind of case change measure and control device that can automatically switch direct-flow input signal type
KR20140072992A (en) Subscriber Identification Module for Electronic metering energy in SmartGrid, and System and Method of Electronic measuring using thereof

Legal Events

Date Code Title Description
AS Assignment

Owner name: POWER MEASUREMENT LTD., CANADA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:HARDING, STEWART J.;HIRSCHBOLD, MARKUS F.;JONKER, RENE T.;AND OTHERS;REEL/FRAME:013732/0910;SIGNING DATES FROM 20030117 TO 20030129

STCF Information on status: patent grant

Free format text: PATENTED CASE

FPAY Fee payment

Year of fee payment: 4

FPAY Fee payment

Year of fee payment: 8

FPAY Fee payment

Year of fee payment: 12